Coping with Access Control Requirements in the Context of Mutual Dependencies between Business and IT

R. Pilipchuk
{"title":"Coping with Access Control Requirements in the Context of Mutual Dependencies between Business and IT","authors":"R. Pilipchuk","doi":"10.1145/3277570.3277587","DOIUrl":null,"url":null,"abstract":"IT security is ever more important due to rising cybercrime incidents, obligatory security laws and the need for organization-wide security strategies. Consequently, the business level of an organization, service design managers and compliance managers according to ITIL, have to focus increasingly on: a) compliance to the rising amount of laws, b) organization-wide IT security and c) the establishment of security strategies to secure critical business data. Therefore, a close cooperation with the IT is needed. This paper proposes an approach to close the gap between the business level and the IT with focus on access control requirements, coming from the business level. The approach eases the role engineering process for role based access control and establishes a traceability between business processes and access control requirements as well as enterprise architectures. Furthermore, it increases the compliance between enterprise architectures and access control requirements from business processes and allows understanding the mutual dependencies of business processes, access control requirements and enterprise architectures in evolution scenarios.","PeriodicalId":164597,"journal":{"name":"Proceedings of the Central European Cybersecurity Conference 2018","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Central European Cybersecurity Conference 2018","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3277570.3277587","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

IT security is ever more important due to rising cybercrime incidents, obligatory security laws and the need for organization-wide security strategies. Consequently, the business level of an organization, service design managers and compliance managers according to ITIL, have to focus increasingly on: a) compliance to the rising amount of laws, b) organization-wide IT security and c) the establishment of security strategies to secure critical business data. Therefore, a close cooperation with the IT is needed. This paper proposes an approach to close the gap between the business level and the IT with focus on access control requirements, coming from the business level. The approach eases the role engineering process for role based access control and establishes a traceability between business processes and access control requirements as well as enterprise architectures. Furthermore, it increases the compliance between enterprise architectures and access control requirements from business processes and allows understanding the mutual dependencies of business processes, access control requirements and enterprise architectures in evolution scenarios.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在业务和IT相互依赖的环境中处理访问控制需求
由于不断上升的网络犯罪事件、强制性的安全法律以及对组织范围内的安全策略的需求,IT安全变得越来越重要。因此,组织的业务层,服务设计经理和遵从性经理(根据ITIL)必须越来越多地关注:a)遵守越来越多的法律,b)组织范围的IT安全性,以及c)建立安全策略以保护关键业务数据。因此,需要与IT部门密切合作。本文提出了一种方法来缩小业务层和IT层之间的差距,重点关注来自业务层的访问控制需求。该方法简化了基于角色的访问控制的角色工程过程,并在业务流程和访问控制需求以及企业架构之间建立了可跟踪性。此外,它增加了企业架构和来自业务流程的访问控制需求之间的遵从性,并允许理解业务流程、访问控制需求和企业架构在演进场景中的相互依赖关系。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Coping with Access Control Requirements in the Context of Mutual Dependencies between Business and IT A brief look at the security of DeviceNet communication in industrial control systems Proceedings of the Central European Cybersecurity Conference 2018 Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments Virtual honeypots and detection of telnet botnets
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1